cvelist/2024/23xxx/CVE-2024-23920.json

82 lines
2.6 KiB
JSON
Raw Normal View History

2024-01-23 22:00:36 +00:00
{
2025-01-31 01:00:30 +00:00
"data_version": "4.0",
2024-01-23 22:00:36 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-23920",
2025-01-31 01:00:30 +00:00
"ASSIGNER": "ics-cert@hq.dhs.gov",
"STATE": "PUBLIC"
2024-01-23 22:00:36 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2025-01-31 01:00:30 +00:00
"value": "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of ChargePoint Home Flex charging stations. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the onboardee module. The issue results from improper access control. An attacker can leverage this vulnerability to execute code in the context of root."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "ChargePoint",
"product": {
"product_data": [
{
"product_name": "Home Flex",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1048/",
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-24-1048/"
2024-01-23 22:00:36 +00:00
}
]
2025-01-31 01:00:30 +00:00
},
"generator": {
"engine": "Vulnogram 0.2.0"
},
"source": {
"discovery": "EXTERNAL"
},
"solution": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "The vendor states this vulnerability was patched in May 2024.\n\n<br>"
}
],
"value": "The vendor states this vulnerability was patched in May 2024."
}
]
2024-01-23 22:00:36 +00:00
}